Security Whitepapers

In a recent survey, 300 IT professionals were asked about their security practices, solutions and challanges. This infographic presents what was learned about their choices, and why they're probably not effective against today's advanced, zero-day security threats.

As modern malware gets trickier and harder to catch, you’d think slow, heavy endpoint solutions would be a thing of the past. But many businesses still suffer under the weight of long security scan times, massive downloads, and resource-hogging software clients that can’t keep up with today’s threats. Isn’t it time to put the old model out to pasture?

Internet security challenges are asking some tough questions of organisations in APAC countries, finding that the region is facing a tough fight, which is in line with the situation in the rest of the world. Find out:
•The wide variety of routes to respond to security threats used in APAC countries
•The business technology trends seen across many organisations that have made security weaknesses more likely
•Why and end-to-end, ‘always-on’ approach needs to be taken for the future

This white paper presents a best-practice case for creating a proactive security strategy against DDoS attacks – a more effective approach that does not involve a multiple layers. Find out:
• Why going against the industry norm of multi-layer security may be the best choice
• The most common of the more than 150 multi-dimensional DDoS attacks
• How to find and address the weak links in your security

This report, prepared by the Economist Intelligence Unit (EIU) details how today companies are collaborating more on data security breaches.
• As data collected by companies increases, organisations face significant security challenges
• This research explores the ways in which organisations are co-operating with governments, other companies and third parties
• Despite failure to protect data, firms are not blaming their IT systems. Rather, the high level of reported trust in IT) illustrates acceptance that data breaches are going to occur

This guide details the threats common to websites and web applications and what you can do to mitigate them.
• The data centre perimeter is dead. But its memory lives on in the way many IT departments continue to secure their infrastructure.
• Businesses must determine which of their assets are most at risk and determine their tolerance for risk.
• Managing that risk means extending security controls to the cloud

This white paper explores how, with so much depending on web site availability, CSOs are considering new ways to be cost-effectively proactive and vigilant
•Websites have become an incalculably valuable part of doing business and have redefined how enterprises are being run
•Thanks to these news business models, organisations have a much broader awareness of how critical web services are
•IDG research shows the majority of today's technology and security executives are concerned about web security

This paper follows the monitoring and analysis of malicious cyber threats using research, digital forensics and post event analysis to build a global view of the threats, vulnerabilities and trends.
•Malicious actors are now switching tactics to build, deploy and conceal powerful botnets
•DDoS attack activity and sizes have remained elevated throughout the first half of 2014
•Malicious actors were able to generate large attack sizes by employing reflection and amplification techniques

Distributed denial of service (DDoS) attacks can degrade an organisation's online presence and restrict the availability of its services. This white paper addresses the use of DDoS attacks as a mechanism for damaging the financial industry and interfering with financial markets.
•A rising number of attacks have been targeting the financial industry, and governments are considering the national security implications
•The public image of a financial service firm is intricately associated with its cyber presence
•This paper demonstrates a widespread pattern of DDoS attacks and identifies the effects on valuations and financial exchanges

This paper is based on conversations had at an IDC roundtable with key IT decision makers from various industries and the issues they are facing with security to their business infrastructure and how cloud-based security solutions fit into this picture.
•This paper also touches upon some best practices when it comes to securing an organisations IT infrastructure
•Fewer and fewer attacks are straightforward in nature; a silver bullet to this problem unfortunately has yet to be developed
•Signature-based solutions are no longer solely effective against these sophisticated attacks

Copyright 2015 IDG Communications. ABN 14 001 592 650. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission of IDG Communications is prohibited.